Enterprise-Capable BYOD
A recent InformationWeek Survey on Mobile Security found that 83% of organizations either support or are planning to support bring your own device (BYOD) initiatives that will allow employees to use their personal smartphones and tablets to access corporate email and other systems. While BYOD has been growing by leaps and bounds, many organizations have not thought through the security exposures and other risks that come with these employee-friendly initiatives. It might be time to reassess your BYOD program and potentially put systems in place that can reduce your exposure going forward.
Many organizations underestimate the magnitude of the change that occurs when they go from a traditional BlackBerry environment with security and policy enforcement provided by a BlackBerry Enterprise Server (BES) to one where any number of different devices with different operating systems, on different software releases, from different manufacturers are all storing sensitive corporate data and accessing corporate systems.
Some organizations have resorted to implementing mobile device management (MDM) systems like those from AirWatch (now a division of VMWare), MobileIron or Good Technologies to help mitigate the risk; however, there are limits to the security capabilities they can provide. MDM solutions can enforce policies like onboard encryption and ensuring there is a strong password to access corporate data that is stored in a secure container on the device, but that's not all you need to protect against.
Frankly, those MDM platforms are more focused on email and data, and companies also need to think about their voice assets as well. Even something as seemingly benign as company contacts can have value to a potential intruder, as they can be a great asset in executing social engineering or targeted spear phishing attacks.
Also, the phone number itself can be an issue. If a user is in a customer-facing position and is passing out their personal cellphone number, what happens if they leave the company? Now you may have a situation where your customers are calling a potentially disgruntled ex-employee who could well be working for one of your competitors! And the employee need not give out the number, as that customer could get the number from the caller ID if the user simply called them from the mobile number.
For some types of businesses, maintaining control of those contact numbers can be critical, but there are instances when employees might want to use their own phones but don't want the number to leak out to their correspondents. Most people think of doctors using their cell phones to call patients, but other examples would include school teachers and administrators, home health care workers, social workers, and parole officers.
The other potential problem with having employees use their own phones, is that there is no way of tracking who they are contacting. All of those communications are outside of the business telephone system, so no PBX call detail records are produced. Most cell phone bills today no not include call detail, so essentially there is no record of who is calling whom or when.
Communication vendors are taking notice, and developing solutions for these problems. One example is ESI, which developed Ditto, a mobile unified communications (UC) app for iOS and Android devices. Working in conjunction with the ESI Cloud PBX, the simultaneous ring feature allows the user to publish one number, their desk number, and receive calls on either their desk phone or their mobile, and the business contacts never need to know the mobile number.
Users get access to the corporate directory, and have the ability to hold, transfer or park calls just as they would on their desk phones. Probably the most convenient feature is the ability to seamlessly move an active call from the desk phone to the mobile so that the conversation can continue if the user needs to leave the office.
We have had mobile UC clients with premises-based UC solutions for several years, although those solutions are far from ideal. New cloud-based UC solutions offer advantages that overcome some of the limitations of premises-based solutions. For example, in most cases for premises-based solution, all mobile calls are routed through the PBX, which means that every mobile call ties up two trunks for the duration of the call - one for the mobile call in, and one for the call to the correspondent. The term "hairpinning" is used to describe this configuration. Cloud-based UC solutions provide a better solution, as the "trunks" are virtual, so it's not an issue for the customer.
The other advantage of using a cloud-based solution is control. Users can set-up access preferences, call forwarding or activate do-not-disturb through a web portal (which can be accessed from their mobile browser) regardless of where they are.
BYOD is now the reality in business communications for many organizations, and IT departments need to understand how they can best support these personally owned mobile devices in an enterprise environment. The key will be to deliver the UC capabilities to mobile users in a fashion that allows the company to maintain control of its contact numbers and monitor its communications while providing a user experience that the mimics what the user has come to expect from their mobile device.
That's a tall order, but achievable.
This paper is sponsored by ESI.
Tags
Start YourCustomized Search
SOLUTION AREA
SOLUTION PROVIDERS
- 8x8 (40) Apply 8x8 filter
- Alcatel-Lucent Enterprise (50) Apply Alcatel-Lucent Enterprise filter
- AT&T (44) Apply AT&T filter
- AudioCodes (49) Apply AudioCodes filter
- Avaya (397) Apply Avaya filter
- Cisco (574) Apply Cisco filter
- Dell (11) Apply Dell filter
- Five9 (55) Apply Five9 filter
- Fuze (39) Apply Fuze filter
- Genesys (100) Apply Genesys filter
- HP (98) Apply HP filter
- IBM (171) Apply IBM filter
- Jabra (9) Apply Jabra filter
- Logitech (56) Apply Logitech filter
- Lumen (4) Apply Lumen filter
- Masergy (50) Apply Masergy filter
- Microsoft (766) Apply Microsoft filter
- Mitel (233) Apply Mitel filter
- NEC (128) Apply NEC filter
- Nectar (58) Apply Nectar filter
- Polycom (95) Apply Polycom filter
- Ramp (37) Apply Ramp filter
- RingCentral (127) Apply RingCentral filter
- Sennheiser (18) Apply Sennheiser filter
- Slack (13) Apply Slack filter
- Tata Communications (59) Apply Tata Communications filter
- Unify (186) Apply Unify filter
- Vonage Business (80) Apply Vonage Business filter
- Yealink (8) Apply Yealink filter
- Zoho (6) Apply Zoho filter
- Zoom (22) Apply Zoom filter
- Acme Packet (24) Apply Acme Packet filter
- Allworx (2) Apply Allworx filter
- Arkadin (22) Apply Arkadin filter
- Aspect (34) Apply Aspect filter
- BT (25) Apply BT filter
- CaféX (8) Apply CaféX filter
- CallTower (14) Apply CallTower filter
- Clarity Connect (10) Apply Clarity Connect filter
- Continuant (1) Apply Continuant filter
- Damaka (4) Apply Damaka filter
- Dialogic (5) Apply Dialogic filter
- Dimension Data (44) Apply Dimension Data filter
- Empirix (11) Apply Empirix filter
- Enghouse Interactive (17) Apply Enghouse Interactive filter
- Inference Solutions (9) Apply Inference Solutions filter
- IntelePeer (27) Apply IntelePeer filter
- IR (11) Apply IR filter
- Jive (21) Apply Jive filter
- Kurmi Software (21) Apply Kurmi Software filter
- Lifesize (33) Apply Lifesize filter
- Lightware (3) Apply Lightware filter
- Mavenir (6) Apply Mavenir filter
- Modality Systems (8) Apply Modality Systems filter
- Momentum (36) Apply Momentum filter
- Netfortris (5) Apply Netfortris filter
- NetSapiens (6) Apply NetSapiens filter
- NewVoiceMedia (31) Apply NewVoiceMedia filter
- Nureva (26) Apply Nureva filter
- NUWAVE (5) Apply NUWAVE filter
- Orange (32) Apply Orange filter
- OVCC (8) Apply OVCC filter
- Panasonic (18) Apply Panasonic filter
- PanTerra Networks (9) Apply PanTerra Networks filter
- ScanSource (21) Apply ScanSource filter
- SIPPIO (3) Apply SIPPIO filter
- Snom (20) Apply Snom filter
- Star2Star (8) Apply Star2Star filter
- StarLeaf (12) Apply StarLeaf filter
- Tadiran Telecom (2) Apply Tadiran Telecom filter
- TekVizion (9) Apply TekVizion filter
- Unimax (7) Apply Unimax filter
- Verint (44) Apply Verint filter
- Voice4Net (2) Apply Voice4Net filter
- VOSS (85) Apply VOSS filter
- Voxbone (14) Apply Voxbone filter
- West (28) Apply West filter
- XO Communications (3) Apply XO Communications filter
- Yorktel (17) Apply Yorktel filter
- Zultys (2) Apply Zultys filter
- 3CX (8) Apply 3CX filter
- ADDASOUND (1) Apply ADDASOUND filter
- Aerohive (1) Apply Aerohive filter
- Aryaka (1) Apply Aryaka filter
- Asurion (22) Apply Asurion filter
- Avnet (7) Apply Avnet filter
- Bandwidth (5) Apply Bandwidth filter
- Calabrio (5) Apply Calabrio filter
- Consilium Software (13) Apply Consilium Software filter
- Drum (5) Apply Drum filter
- ESI (6) Apply ESI filter
- Esna (16) Apply Esna filter
- Exinda (2) Apply Exinda filter
- EZuce (3) Apply EZuce filter
- GUnify (6) Apply GUnify filter
- Highfive (4) Apply Highfive filter
- Huawei (47) Apply Huawei filter
- Imagicle (3) Apply Imagicle filter
- IPCortex (1) Apply IPCortex filter
- KnoahSoft (1) Apply KnoahSoft filter
- KOVA (1) Apply KOVA filter
- Logmein (9) Apply Logmein filter
- Metropolis Technologies (4) Apply Metropolis Technologies filter
- Mutare (2) Apply Mutare filter
- NextPlane (27) Apply NextPlane filter
- Ooma (16) Apply Ooma filter
- Patton (11) Apply Patton filter
- Radish Systems (1) Apply Radish Systems filter
- Radisys (3) Apply Radisys filter
- Shango (1) Apply Shango filter
- SMART (163) Apply SMART filter
- Stack8 (1) Apply Stack8 filter
- Swyx (1) Apply Swyx filter
- TrueConf (4) Apply TrueConf filter
- UJET (13) Apply UJET filter
- Voximplant (3) Apply Voximplant filter
CONTENT TYPE
- BC Expert Insights Market (44) Apply BC Expert Insights Market filter
- BC Expert Insights Objective - Vendor Neutral (42) Apply BC Expert Insights Objective - Vendor Neutral filter
- BC Expert Insights Planning (15) Apply BC Expert Insights Planning filter
- BC Expert Insights Solution (12) Apply BC Expert Insights Solution filter
- BC Expert Insights Vendor (82) Apply BC Expert Insights Vendor filter
- BC Expert Insights Vendor Solution (150) Apply BC Expert Insights Vendor Solution filter
- BC Expert Roundtable (136) Apply BC Expert Roundtable filter
- Bcs Webinar (0)
- Bcs Webinar Registration (0)
- Best Practice (38) Apply Best Practice filter
- Buyer Guide (14) Apply Buyer Guide filter
- Case Study (29) Apply Case Study filter
- Executive Interview (145) Apply Executive Interview filter
- Expert Roundtable (453) Apply Expert Roundtable filter
- Guest Contributions (35) Apply Guest Contributions filter
- Multimedia (38) Apply Multimedia filter
- News Analysis (2081) Apply News Analysis filter
- Newsfeed Article (1303) Apply Newsfeed Article filter
- Newsfeed Article (1) Apply Newsfeed Article filter
- Thought Leadership (21) Apply Thought Leadership filter
- Vendor Collateral (211) Apply Vendor Collateral filter
- Vendor Resource Best Practices (24) Apply Vendor Resource Best Practices filter
- Vendor Resource Buyers Guides (2) Apply Vendor Resource Buyers Guides filter
- Vendor Resource Multimedia Content (4) Apply Vendor Resource Multimedia Content filter
- Vendor Resource White Paper (4) Apply Vendor Resource White Paper filter
- Webinar (13) Apply Webinar filter
- Webinars (7) Apply Webinars filter
- White Paper (64) Apply White Paper filter
MORE FILTERS
INDUSTRY
- Banking And Investment (800) Apply Banking And Investment filter
- Education (446) Apply Education filter
- Energy And Utilities (487) Apply Energy And Utilities filter
- Finance (12) Apply Finance filter
- Government (675) Apply Government filter
- Healthcare (482) Apply Healthcare filter
- Hospitality (180) Apply Hospitality filter
- Insurance (100) Apply Insurance filter
- Manufacturing (704) Apply Manufacturing filter
- Media/Publishing (422) Apply Media/Publishing filter
- None (43) Apply None filter
- Professional Services (745) Apply Professional Services filter
- Retail & Distribution (798) Apply Retail & Distribution filter
- Technology (1611) Apply Technology filter
- Transportation (110) Apply Transportation filter
Comments
There are currently no comments on this article.
You must be a registered user to make comments